Investigating Fake News With Google, YouTube & Facebook

Tech bosses Mark Zuckerberg, Sundar Pichai and Jack Dorsey were being questioned last week by politicians in the US Congress over the proliferation of disinformation on YouTube, Twitter and Facebook in the first such since the storming of the Washington Capitol building, which many believe will prove a tipping point for greater regulation of Social Media..

Specifically, the hearings are related to the Congress'  consideration of scrapping Section 230, the legislation that was crafted in the early days of the internet so that website owners could moderate sites without worrying about legal liability, by effectively saying that they are not publishers.

Because social media is a public platform, anyone, including news outlets, can post anything without being accountable for fact-checking and it left to users to distinguish misinformation from disinformation and plain lies in their feeds.  Academics and practitioners alike have asked why people share such misinformation, and sought solutions to reduce the sharing of misinformation

The sharing of misinformation on social media, including, but not limited to, blatantly false political ‘fake news’ and misleading and partisan content, has become a major topical focus of public debate and academic study.

Although misinformation is nothing new, the topic gained prominence in 2016 after the US Presidential Election and the UK’s Brexit referendum, during which entirely fabricated stories, which were presented as legitimate news, received wide distribution via social media. 

This is a problem that has gained even more attention during the COVID-19 pandemic. and the Capitol Hill riot following the 2020 US Presidential Election.  

  • First in the line of fire was Facebook boss, Mark Zuckerberg who favours limited reforms, going further than his two peers. "We believe Congress should consider making platforms' intermediary liability protection for certain types of unlawful content conditional on companies' ability to meet best practice to combat the spread of this content," he wrote. 
  • Twitter's Mr Dorsey said efforts to combat misinformation must be linked to "earning trust" from users by focusing on "enhancing transparency, ensuring procedural fairness, enabling algorithmic choice, and strengthening privacy".
  • Mr Pichai  referred to Section 230, saying repealing it "would have unintended consequences - harming both free expression and the ability of platforms to take responsible action to protect users in the face of constantly evolving challenges".

The truth and accuracy of news headlines has little effect on social media users' sharing intentions and sharing itself does not necessarily indicate belief. Most participants say it is important to share only accurate news, however to investigate this apparent contradiction, various surveys have been done and a field experiment carried out on Twitter. The results show that subtly shifting attention to accuracy increases the quality of news that people subsequently share.

Together with additional computational analyses, these findings indicate that people often share misinformation because their attention is focused on factors other than accuracy, and therefore they fail to implement a strongly held preference for accurate sharing.

Misinformation is problematic because it leads to inaccurate beliefs and can exacerbate partisan disagreement over even basic facts. Merely reading false news posts, including political posts that are extremely implausible and inconsistent with one’s political ideology, makes them subsequently seem more true

In addition to being concerning, the widespread sharing of misinformation on social media is surprising, given the outlandishness of much of this content.

What differentiates misinformation from disinformation is the intent of the person or outlet sharing it. In a study by researchers for from Indiana University, misinformation is classified as “false or misleading content including hoaxes, conspiracy theories, fabricated reports, click-bait headlines, and even satire.” Misinformation is not deliberately intended to deceive. Instead, it aims to shape or change public opinion on a given topic.

Indiana University:     Nature:      BBC:       NiemanLab:      MailChimp:      Image: Unsplash

You Might Also Read: 

Social Media Has Gone Global:

Easy Cyber Knowledge Chapter 3  - Social Media & Social Change (£) :

 

« Facebook's Internal Content Rules Revealed
CISA, NSA And The Dual Hat »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Cyber Wales

Cyber Wales

Cyber Wales provides a focus and forum for everyone in the industry, helping businesses come together and collaborate both within Wales and internationally.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.